Preview

Ethics

Good Essays
Open Document
Open Document
916 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics
Trends in technology

1. Differentiate between Black Hat and White Hat Hacking

Black Hat Hackers; groups of individuals that writes and deploys malware programs and or viruses for profit or for fun.

White hat hackers; these represent law cyber-crime police officers with the responsibility of eliminating or minimizing the activities of said Black Hat Hackers.

2. Explain carefully the differences between Phishing and Pharming as types of mobile malware innovations.

Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by email or instant messaging, and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users.

Pharming is a Hacker's attack aiming to redirect a website's traffic to another, bogus website. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real addresses - they are the "signposts" of the Internet. Compromised DNS servers are sometimes referred to as "poisoned".

3. How can you ensure confidentiality on a mobile device .

By encrypting data that you send and receive.

4. Explain how a mobile device service can provide shared access to its users by supporting a Chinese wall model of service versus a Clark Wilson model of service

5. The Hacking process involves, foot-printing, scanning and trace-routing. Briefly explain these processes.

Foot-printing This technique involves identifying the source of the computers and their I.P. Addresses for which the hacker would like to compromise.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a. Vulnerability scans performed from external hosted servers give the same perspective as an attacker. Two types of hacking are White hats which are individuals that used their abilities to find vulnerabilities in systems and networks and then report them to the owner of the system so that they can be fixed. Black Hats are individuals that break into systems or networks that are not authorized to.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    When a computer get infected with this virus, the computer screen will be flooded with various unexpected advertisements which can prevent a user from surfing on the Internet normally.The group of hackers created this adware to earn quick money by creating online traffic through which they can generate pay-per-click and marketing revenue.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hat colors are often attributed to depict the mentality of a hacker or a cracker. Black hat corresponds to a harmful system intruder. White hat corresponds to a helpful security practitioner. Gray hat corresponds to a hacker who may act in goodwill, but also crosses the line to commit illegal acts.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Phishing

    • 2531 Words
    • 11 Pages

    The Internet has brought an exciting global marketplace directly to our fingertips, allowing us to shop and invest at our convenience. Yet when you provide personal information and check out your "shopping cart" at an online store, can you be certain your purchase will be safe? Can someone steal your credit card number during a transaction? Can you confirm that you are doing business with a reputable Web site and not with a shady imposter?…

    • 2531 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 311 Words
    • 2 Pages

    when someone uses fake identification and pretends to be someone else to try and lure someone else into giving them their information.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Browser Security Report

    • 885 Words
    • 4 Pages

    Web Forgery (Phishing) is a way of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. The name “phishing” is come from the real life activity of fishing, the criminals are the fisherman, they puts a bait at the hook, thus, pretending to be a genuine food for fish (web users), but the hook inside it takes the complete fish out of the pool. Phishing attacks are typically come from email messages or instant massagers that attempt the lure recipient into giving their personal information on fake web sites whose look and feel are almost identical to the real one, they might even use the logo, images and details from the real site.…

    • 885 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer hacking isn't something you here about everyday on the news. Really people don't have any knowledge about computer hacking. Everyday our identities go through about eight hundred computers a day. Every time we swipe a card, make a telephone call or connect to the internet our digital identities are recorded to keep track of who is doing what. Now the records are kept by different companies. The government also takes part in this game. These company computers are supposedly protected by anti-hacking programs. Well, unfortunately hacker can still get through. And when they get through your identity is up for grabs. This is what happening everyday and no one knows but the hacker and you. Until a hacker get control of a major corporate company, and then everybody in the world is talking about Enron's bank account being hacked into and sucked dry of all its money. Most people say hackers are greedy creatures that only want money. That is not always the case some hackers do it for fun, some do it for power, others do it because they don't won't to be ruled by the government. So, really and truly what are hacking programs? Where do they come from and what are the type's hackers?…

    • 794 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    e-com

    • 2052 Words
    • 9 Pages

    2. Describe two possible service-for-fee offerings that might become available to users of Internet-enabled wireless devices (such as PDAs or mobile phones) in the near future. Write one paragraph for each service in which you outline the profit potential and risk of losses for each.…

    • 2052 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    first I want to say that there is an immense difference between coding, white hat hacking, and black hat hacking. The differences between these three is that coding is a programmer with limited experience who writes simple programs like on scratch, however, a coder can also be referred to a very experienced programmer like Dennis Ritchie or Linus Torvalds, a black hat hacker is a person with computer knowledge and is trying…

    • 402 Words
    • 2 Pages
    Satisfactory Essays